Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2019-13272
Vulnerability from cvelistv5
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2021-12-10
Due date: 2022-06-10
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-13272
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:49:24.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140671" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "name": "FEDORA-2019-a95015e60f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/" }, { "name": "DSA-4484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4484" }, { "name": "20190722 [SECURITY] [DSA 4484-1] linux security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jul/30" }, { "name": "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jul/33" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190806-0001/" }, { "name": "RHSA-2019:2405", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2405" }, { "name": "RHSA-2019:2411", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2411" }, { "name": "USN-4093-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4093-1/" }, { "name": "USN-4094-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4095-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4095-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K91025336" }, { "name": "USN-4117-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4118-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "RHSA-2019:2809", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2809" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T18:06:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140671" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "name": "FEDORA-2019-a95015e60f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/" }, { "name": "DSA-4484", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4484" }, { "name": "20190722 [SECURITY] [DSA 4484-1] linux security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jul/30" }, { "name": "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jul/33" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190806-0001/" }, { "name": "RHSA-2019:2405", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2405" }, { "name": "RHSA-2019:2411", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2411" }, { "name": "USN-4093-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4093-1/" }, { "name": "USN-4094-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4095-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4095-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K91025336" }, { "name": "USN-4117-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4118-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "RHSA-2019:2809", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2809" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", "refsource": "MISC", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17" }, { "name": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", "refsource": "MISC", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1140671", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140671" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "name": "FEDORA-2019-a95015e60f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/" }, { "name": "DSA-4484", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4484" }, { "name": "20190722 [SECURITY] [DSA 4484-1] linux security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jul/30" }, { "name": "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jul/33" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html" }, { "name": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190806-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190806-0001/" }, { "name": "RHSA-2019:2405", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2405" }, { "name": "RHSA-2019:2411", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2411" }, { "name": "USN-4093-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4093-1/" }, { "name": "USN-4094-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4095-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4095-1/" }, { "name": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html" }, { "name": "https://support.f5.com/csp/article/K91025336", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91025336" }, { "name": "USN-4117-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "RHSA-2019:2809", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2809" }, { "name": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html" }, { "name": "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html" }, { "name": "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13272", "datePublished": "2019-07-17T12:32:55", "dateReserved": "2019-07-04T00:00:00", "dateUpdated": "2024-08-04T23:49:24.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "cisa_known_exploited": { "cveID": "CVE-2019-13272", "cwes": "[\"CWE-269\"]", "dateAdded": "2021-12-10", "dueDate": "2022-06-10", "knownRansomwareCampaignUse": "Unknown", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", "product": "Kernel", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "Kernel/ptrace.c in Linux kernel mishandles contains an improper privilege management vulnerability that allows local users to obtain root access.", "vendorProject": "Linux", "vulnerabilityName": "Linux Kernel Improper Privilege Management Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-13272\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-07-17T13:15:10.687\",\"lastModified\":\"2024-11-21T04:24:35.753\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux anterior a versi\u00f3n 5.1.17, ptrace_link en el archivo kernel/ptrace.c maneja inapropiadamente la grabaci\u00f3n de las credenciales de un proceso que desea crear una relaci\u00f3n de ptrace, que permite a los usuarios locales obtener acceso de root aprovechando determinados escenarios con un relaci\u00f3n de proceso padre-hijo, donde un padre elimina los privilegios y llama a execve (permitiendo potencialmente el control por parte de un atacante). Un factor que contribuye es un problema de vida \u00fatil del objeto (que tambi\u00e9n puede causar un p\u00e1nico). Otro factor que contribuye es el marcado incorrecto de una relaci\u00f3n de ptrace como privilegiada, que puede ser explotada mediante (por ejemplo) el ayudante pkexec de Polkit con PTRACE_TRACEME. NOTA: deny_ptrace de SELinux puede ser una soluci\u00f3n \u00fatil en algunos entornos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2021-12-10\",\"cisaActionDue\":\"2022-06-10\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Linux Kernel Improper Privilege Management Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.16.52\",\"versionEndExcluding\":\"3.16.71\",\"matchCriteriaId\":\"AA88B130-CD8A-4E14-A1F5-4D1DB031D60E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1.39\",\"versionEndExcluding\":\"4.2\",\"matchCriteriaId\":\"CD709672-0E6A-4086-8700-B6C2FDD8599C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.40\",\"versionEndExcluding\":\"4.4.185\",\"matchCriteriaId\":\"19FB5FC5-740B-418F-B83A-3EA6095270C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.8.16\",\"versionEndExcluding\":\"4.9\",\"matchCriteriaId\":\"66431BA1-01B5-476A-B483-AE4E7B830BA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9.1\",\"versionEndExcluding\":\"4.9.185\",\"matchCriteriaId\":\"8A719867-AEB7-4E95-A1DE-B96EA092D9FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.133\",\"matchCriteriaId\":\"00D95A2F-5B17-46D9-80D7-2E0D1779C2CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.58\",\"matchCriteriaId\":\"F921620B-E2A7-421F-8C89-016C51723C17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.1.17\",\"matchCriteriaId\":\"7049E422-0D4B-45FD-8B06-04BACD44A66E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"B3293E55-5506-4587-A318-D1734F781C09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:7.0_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA559D29-DF65-48AF-96DB-D20A50474758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2148300C-ECBD-4ED5-A164-79629859DD43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF9BCF3-187F-410A-96CA-9C47D3ED6924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"782C86CD-1B68-410A-A096-E5170AD24DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C61DDC-81F3-4E2D-9CAA-17A256C85443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B0DA79-DF12-4418-B075-F048C9E2979A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5DE3C5-B090-4CE7-9AF2-DEB379D7D5FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF7275A1-8853-469E-939B-7533E9E8C499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92409A9-0D6B-4B7E-8847-1B63837D201F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5C5860E-9FEB-4259-92FD-A85911E2F99E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE99A08-D6F7-4937-8154-65062BC88009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"665DF1D3-EB88-4A17-B888-3B3CE298269B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952F55C9-7E7C-4539-9D08-E736B3488569\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FED1B0D-F901-413A-85D9-05D4C427570D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7CFE0E-9D1E-4495-B302-89C3096FC0DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B8DB06-590A-4008-B0AB-FCD1401C77C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.60.3\",\"matchCriteriaId\":\"BD1E9594-C46F-40D1-8BC2-6B16635B55C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146A767F-DC04-454B-9913-17D3A2B5AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E94F7F59-1785-493F-91A7-5F5EA5E87E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2405\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2411\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2809\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1903\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1730895\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1140671\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/30\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/33\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190806-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91025336\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4093-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4094-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4095-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4117-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4484\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2405\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2411\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2809\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1730895\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1140671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190806-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91025336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4093-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4094-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4095-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4117-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4118-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4484\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2019-13272
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-13272", "description": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", "id": "GSD-2019-13272", "references": [ "https://www.suse.com/security/cve/CVE-2019-13272.html", "https://www.debian.org/security/2019/dsa-4484", "https://access.redhat.com/errata/RHSA-2019:2809", "https://access.redhat.com/errata/RHSA-2019:2411", "https://access.redhat.com/errata/RHSA-2019:2405", "https://ubuntu.com/security/CVE-2019-13272", "https://linux.oracle.com/cve/CVE-2019-13272.html", "https://packetstormsecurity.com/files/cve/CVE-2019-13272", "https://alas.aws.amazon.com/cve/html/CVE-2019-13272.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-13272" ], "details": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", "id": "GSD-2019-13272", "modified": "2023-12-13T01:23:41.646056Z", "schema_version": "1.4.0" } }, "namespaces": { "cisa.gov": { "cveID": "CVE-2019-13272", "dateAdded": "2021-12-10", "dueDate": "2022-06-10", "product": "Kernel", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "Kernel/ptrace.c in Linux kernel mishandles contains an improper privilege management vulnerability which allows local users to obtain root access.", "vendorProject": "Linux", "vulnerabilityName": "Linux Kernel Improper Privilege Management Vulnerability" }, "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", "refsource": "MISC", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17" }, { "name": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", "refsource": "MISC", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1140671", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140671" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "name": "FEDORA-2019-a95015e60f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/" }, { "name": "DSA-4484", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4484" }, { "name": "20190722 [SECURITY] [DSA 4484-1] linux security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jul/30" }, { "name": "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jul/33" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html" }, { "name": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190806-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190806-0001/" }, { "name": "RHSA-2019:2405", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2405" }, { "name": "RHSA-2019:2411", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2411" }, { "name": "USN-4093-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4093-1/" }, { "name": "USN-4094-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4095-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4095-1/" }, { "name": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html" }, { "name": "https://support.f5.com/csp/article/K91025336", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91025336" }, { "name": "USN-4117-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "RHSA-2019:2809", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2809" }, { "name": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html" }, { "name": "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html" }, { "name": "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.133", "versionStartIncluding": "4.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1.17", "versionStartIncluding": "4.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.19.58", "versionStartIncluding": "4.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.16.71", "versionStartIncluding": "3.16.52", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.185", "versionStartIncluding": "4.9.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.2", "versionStartIncluding": "4.1.39", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.185", "versionStartIncluding": "4.4.40", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9", "versionStartIncluding": "4.8.16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.60.3", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13272" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-269" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903" }, { "name": "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17" }, { "name": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1140671", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140671" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "name": "FEDORA-2019-a95015e60f", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/" }, { "name": "DSA-4484", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4484" }, { "name": "20190722 [SECURITY] [DSA 4484-1] linux security update", "refsource": "BUGTRAQ", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jul/30" }, { "name": "20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)", "refsource": "BUGTRAQ", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jul/33" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html" }, { "name": "[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html" }, { "name": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190806-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190806-0001/" }, { "name": "RHSA-2019:2405", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2405" }, { "name": "RHSA-2019:2411", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2411" }, { "name": "USN-4095-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4095-1/" }, { "name": "USN-4094-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4094-1/" }, { "name": "USN-4093-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4093-1/" }, { "name": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html" }, { "name": "https://support.f5.com/csp/article/K91025336", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91025336" }, { "name": "USN-4117-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4117-1/" }, { "name": "USN-4118-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4118-1/" }, { "name": "RHSA-2019:2809", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2809" }, { "name": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html" }, { "name": "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html" }, { "name": "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-17T21:25Z", "publishedDate": "2019-07-17T13:15Z" } } }
rhsa-2019_2405
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2405", "url": "https://access.redhat.com/errata/RHSA-2019:2405" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/4329821", "url": "https://access.redhat.com/articles/4329821" }, { "category": "external", "summary": "1724389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724389" }, { "category": "external", "summary": "1730895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2405.json" } ], "title": "Red Hat Security Advisory: kernel-rt security update", "tracking": { "current_release_date": "2024-11-15T03:13:22+00:00", "generator": { "date": "2024-11-15T03:13:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:2405", "initial_release_date": "2019-08-07T12:58:31+00:00", "revision_history": [ { "date": "2019-08-07T12:58:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-08-07T12:58:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T03:13:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-80.7.2.rt9.154.el8_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "product": { "name": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "product_id": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.7.2.rt9.154.el8_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src" }, "product_reference": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "NFV-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src" }, "product_reference": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "relates_to_product_reference": "RT-8.0.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-1125", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1724389" } ], "notes": [ { "category": "description", "text": "A Spectre gadget was found in the Linux kernel\u0027s implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: hw: Spectre SWAPGS gadget vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "RHBZ#1724389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1125", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1125" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1125" } ], "release_date": "2019-08-06T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-07T12:58:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2405" }, { "category": "workaround", "details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", "product_ids": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: hw: Spectre SWAPGS gadget vulnerability" }, { "cve": "CVE-2019-13272", "cwe": { "id": "CWE-271", "name": "Privilege Dropping / Lowering Errors" }, "discovery_date": "2019-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730895" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel\u0027s implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13272" }, { "category": "external", "summary": "RHBZ#1730895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13272" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-07T12:58:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2405" }, { "category": "workaround", "details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", "product_ids": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.src", "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64", "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.7.2.rt9.154.el8_0.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-12-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: broken permission and object lifetime handling for PTRACE_TRACEME" } ] }
rhsa-2019_2411
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\n* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2411", "url": "https://access.redhat.com/errata/RHSA-2019:2411" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/4329821", "url": "https://access.redhat.com/articles/4329821" }, { "category": "external", "summary": "1724389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724389" }, { "category": "external", "summary": "1730895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2411.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-15T03:13:16+00:00", "generator": { "date": "2024-11-15T03:13:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:2411", "initial_release_date": "2019-08-07T15:19:38+00:00", "revision_history": [ { "date": "2019-08-07T15:19:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-08-07T15:19:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T03:13:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "perf-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "perf-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "perf-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "perf-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "perf-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "perf-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.7.2.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "perf-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "perf-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "perf-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "bpftool-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.7.2.el8_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "product_id": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.7.2.el8_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "product": { "name": "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "product_id": "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.7.2.el8_0?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.7.2.el8_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-80.7.2.el8_0.src", "product": { "name": "kernel-0:4.18.0-80.7.2.el8_0.src", "product_id": "kernel-0:4.18.0-80.7.2.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.7.2.el8_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "bpftool-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.src", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch" }, "product_reference": "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "perf-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "perf-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "perf-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "perf-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "bpftool-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.src", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch" }, "product_reference": "kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "perf-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "perf-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "perf-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "perf-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "relates_to_product_reference": "CRB-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "relates_to_product_reference": "CRB-8.0.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-1125", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1724389" } ], "notes": [ { "category": "description", "text": "A Spectre gadget was found in the Linux kernel\u0027s implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: hw: Spectre SWAPGS gadget vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1125" }, { "category": "external", "summary": "RHBZ#1724389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1125", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1125" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1125", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1125" } ], "release_date": "2019-08-06T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-07T15:19:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:2411" }, { "category": "workaround", "details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821", "product_ids": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: hw: Spectre SWAPGS gadget vulnerability" }, { "cve": "CVE-2019-13272", "cwe": { "id": "CWE-271", "name": "Privilege Dropping / Lowering Errors" }, "discovery_date": "2019-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730895" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel\u0027s implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13272" }, { "category": "external", "summary": "RHBZ#1730895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13272" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-07T15:19:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:2411" }, { "category": "workaround", "details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", "product_ids": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.src", "CRB-8.0.0.Z:kernel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.7.2.el8_0.noarch", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.7.2.el8_0.x86_64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.aarch64", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.ppc64le", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.s390x", "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.7.2.el8_0.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-12-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: broken permission and object lifetime handling for PTRACE_TRACEME" } ] }
rhsa-2019_2809
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974)\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [kernel-alt]: BUG: unable to handle kernel NULL pointer IP: crypto_remove_spawns+0x118/0x2e0 (BZ#1536967)\n\n* [HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages (BZ#1610534)\n\n* RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1673613)\n\n* RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in FIPS mode (BZ#1673979)\n\n* RHEL-Alt-7.6 - System crashed after oom - During ICP deployment (BZ#1710304)\n\n* kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127)\n\n* RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3 cores in quad and misses last core. (CORAL) (BZ#1717836)\n\n* RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN (BZ#1717906)\n\n* fragmented packets timing out (BZ#1729066)\n\n* Backport TCP follow-up for small buffers (BZ#1733617)\n\nEnhancement(s):\n\n* RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading nest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2809", "url": "https://access.redhat.com/errata/RHSA-2019:2809" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1664110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110" }, { "category": "external", "summary": "1671913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671913" }, { "category": "external", "summary": "1730895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2809.json" } ], "title": "Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T08:26:15+00:00", "generator": { "date": "2024-11-15T08:26:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:2809", "initial_release_date": "2019-09-20T12:04:26+00:00", "revision_history": [ { "date": "2019-09-20T12:04:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-20T12:04:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:26:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "perf-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "perf-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.12.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.12.1.el7a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "product": { "name": "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "product_id": "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.12.1.el7a?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "product": { "name": "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "product_id": "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.12.1.el7a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-alt-0:4.14.0-115.12.1.el7a.src", "product": { "name": "kernel-alt-0:4.14.0-115.12.1.el7a.src", "product_id": "kernel-alt-0:4.14.0-115.12.1.el7a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.12.1.el7a?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.12.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.12.1.el7a.src", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.12.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.12.1.el7a.src", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.12.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5489", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1664110" } ], "notes": [ { "category": "description", "text": "A new software page cache side channel attack scenario was discovered in operating systems that implement the very common \u0027page cache\u0027 caching mechanism. A malicious user/process could use \u0027in memory\u0027 page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: page cache side channel attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5489" }, { "category": "external", "summary": "RHBZ#1664110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5489", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489" } ], "release_date": "2019-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-20T12:04:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2809" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: page cache side channel attacks" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google" } ], "cve": "CVE-2019-6974", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671913" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the way the Linux kernel\u0027s KVM hypervisor implements its device control API. While creating a device via kvm_ioctl_create_device(), the device holds a reference to a VM object, later this reference is transferred to the caller\u0027s file descriptor table. If such file descriptor was to be closed, reference count to the VM object could become zero, potentially leading to a use-after-free issue. A user/process could use this flaw to crash the guest VM resulting in a denial of service issue or, potentially, gain privileged access to a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "RHBZ#1671913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-6974", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6974" } ], "release_date": "2019-02-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-20T12:04:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2809" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()" }, { "cve": "CVE-2019-13272", "cwe": { "id": "CWE-271", "name": "Privilege Dropping / Lowering Errors" }, "discovery_date": "2019-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730895" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way PTRACE_TRACEME functionality was handled in the Linux kernel. The kernel\u0027s implementation of ptrace can inadvertently grant elevated permissions to an attacker who can then abuse the relationship between the tracer and the process being traced. This flaw could allow a local, unprivileged user to increase their privileges on the system or cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: broken permission and object lifetime handling for PTRACE_TRACEME", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13272" }, { "category": "external", "summary": "RHBZ#1730895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13272" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-20T12:04:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2809" }, { "category": "workaround", "details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4292201", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.12.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.12.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.12.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.12.1.el7a.ppc64le" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-12-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: broken permission and object lifetime handling for PTRACE_TRACEME" } ] }
ghsa-87j5-gppq-mq6h
Vulnerability from github
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME.
{ "affected": [], "aliases": [ "CVE-2019-13272" ], "database_specific": { "cwe_ids": [ "CWE-269" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-17T13:15:00Z", "severity": "HIGH" }, "details": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME.", "id": "GHSA-87j5-gppq-mq6h", "modified": "2024-07-24T18:31:14Z", "published": "2022-05-24T16:50:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13272" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4484" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4118-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4117-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4095-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4094-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4093-1" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K91025336?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K91025336" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190806-0001" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Jul/33" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Jul/30" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html" }, { "type": "WEB", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "type": "WEB", "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140671" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "type": "WEB", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2809" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2411" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2405" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201907-1641
Vulnerability from variot
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. Linux Kernel Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attacker could use this to expose sensitive information. (CVE-2019-10126)
Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors incorrectly handle SWAPGS instructions during speculative execution. 8) - aarch64, noarch, ppc64le, s390x, x86_64
For the oldstable distribution (stretch), this problem has been fixed in version 4.9.168-1+deb9u4.
For the stable distribution (buster), this problem has been fixed in version 4.19.37-5+deb10u1. This update includes as well a patch for a regression introduced by the original fix for CVE-2019-11478 (#930904).
For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl0zJkBfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SvYw/8CJrPtf7juWLaRa3m/LvFewU+BppoJqNaVUbQNXVT90PgH/zDWVbpkJ4g Tr4MW6tzRKnAfUS+jObsnR9jGo871ZZ2wtlcM3W0bMnCwK6tPnTGiqTauflPXf2X KW8V3YLI6W6MxPlSLa2EQkDJ/RfTke4SwQDFDX0lzYjC5LwCwDwKIWBC6P5xBg6w yxNh6PHv9++ES8SKYpU3oMlWG43fJZJ8Oyy7Wdk0H84Qcjxb8FDP2iWyRf0Mvb+5 1uFosUswfN89imMrIFdYhv/z7CYFeHgYA0lPIvQ1gpNWOflrGqoMYL1Pys95mVCV RdRBtWy2atPHos6HEgw85cxaTS9Ss9FYB0sL+QCqIdw5ZwTt5+QR+JLNvJ53VKEm BxE5TncjlEAOc9t74xti/vBW2eCjp7IPaMP8X8eqWKiaMGJBlwaJEPUSmL4SiZo+ cW1plAYxc0CYq4lDWo3fcR7tBMQfp1ffDYUNn3DXvHChF1Ebi3zIdGl+oSeNP8hW OuaH6/P+qko0S/TNXAK5uaekrzjYv2pWm6xoM10fMVXiT8GiyjIGmSTTu6WvaiCA ITdy+o/jAfBiQsdFer2MYUna8QxjOy3XClKsy9+yjrj8ciekC4nOPHdz3/CYfOha cojPRl2Qd2KSWfEUoze2IqPrr3iAnKFKH6a+WU1XQZuo6r3uo0Q= =fTIm -----END PGP SIGNATURE----- . 8) - x86_64
- ========================================================================= Ubuntu Security Notice USN-4117-1 September 02, 2019
linux-aws vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-aws: Linux kernel for Amazon Web Services (AWS) systems
Details:
It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-10126)
Amit Klein and Benny Pinkas discovered that the Linux kernel did not sufficiently randomize IP ID values generated for connectionless networking protocols. A remote attacker could use this to track particular Linux devices. (CVE-2019-10638)
It was discovered that a NULL pointer dereference vulnerability existed in the Near-field communication (NFC) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-12984)
Jann Horn discovered a use-after-free vulnerability in the Linux kernel when accessing LDT entries in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-13233)
Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2019-13272)
It was discovered that the floppy driver in the Linux kernel did not properly validate meta data, leading to a buffer overread. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-14283)
It was discovered that the floppy driver in the Linux kernel did not properly validate ioctl() calls, leading to a division-by-zero. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-14284)
It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-3846)
Jason Wang discovered that an infinite loop vulnerability existed in the virtio net driver in the Linux kernel. A local attacker in a guest VM could possibly use this to cause a denial of service in the host system. (CVE-2019-3900)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04: linux-image-5.0.0-1014-aws 5.0.0-1014.16 linux-image-aws 5.0.0.1014.15
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4117-1 CVE-2019-10126, CVE-2019-10638, CVE-2019-12984, CVE-2019-13233, CVE-2019-13272, CVE-2019-14283, CVE-2019-14284, CVE-2019-3846, CVE-2019-3900
Package Information: https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1014.16 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)
New kernel packages are available for Slackware 14.2 to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/linux-4.4.182/: Upgraded. These updates fix various bugs and many minor security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 4.4.183: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3892 Fixed in 4.4.185: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13272 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16597 Fixed in 4.4.186: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846 ( Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated packages for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-firmware-20190717_bf13a71-noarch-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-generic-4.4.186-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-generic-smp-4.4.186_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-headers-4.4.186_smp-x86-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-huge-4.4.186-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-huge-smp-4.4.186_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-modules-4.4.186-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-modules-smp-4.4.186_smp-i686-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-source-4.4.186_smp-noarch-1.txz
Updated packages for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-firmware-20190717_bf13a71-noarch-1.txz ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-generic-4.4.186-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-headers-4.4.186-x86-1.txz ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-huge-4.4.186-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-modules-4.4.186-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-source-4.4.186-noarch-1.txz
MD5 signatures: +-------------+
Slackware 14.2 packages: 01138ebc336b6e6d692697570bb32920 kernel-firmware-20190717_bf13a71-noarch-1.txz d7e0b9ffdc4265b45d4de39d49d52616 kernel-generic-4.4.186-i586-1.txz c1131f8dd16f7113cc8b1e14c402a9b7 kernel-generic-smp-4.4.186_smp-i686-1.txz ca4630c4ee7056c51f3262152bfb9213 kernel-headers-4.4.186_smp-x86-1.txz 61b95e68756fe9741ddbdc52f397fe49 kernel-huge-4.4.186-i586-1.txz ff981138513726a502d57f9e2aecad36 kernel-huge-smp-4.4.186_smp-i686-1.txz ca8f6fb5fc378d16e5afcee31dd032dc kernel-modules-4.4.186-i586-1.txz 25fc2f1280f1a706705ef4535f4efd1c kernel-modules-smp-4.4.186_smp-i686-1.txz 2d299723d6f910df1e8c21d18070b9ef kernel-source-4.4.186_smp-noarch-1.txz
Slackware x86_64 14.2 packages: 01138ebc336b6e6d692697570bb32920 kernel-firmware-20190717_bf13a71-noarch-1.txz 80caffb238022225afe93b957fecbff2 kernel-generic-4.4.186-x86_64-1.txz f72e4543e3489d18604f33a901e04551 kernel-headers-4.4.186-x86-1.txz 0765db332a94cfedcacd987871903e56 kernel-huge-4.4.186-x86_64-1.txz 8d565a7b223b9444731796e6147116eb kernel-modules-4.4.186-x86_64-1.txz 0254fdbb4430362ea373b47584d8eb30 kernel-source-4.4.186-noarch-1.txz
Installation instructions: +------------------------+
Upgrade the packages as root:
upgradepkg kernel-*.txz
If you are using an initrd, you'll need to rebuild it.
For a 32-bit SMP machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2):
/usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.186-smp | bash
For a 64-bit machine, or a 32-bit uniprocessor machine, use this command (substitute the appropriate kernel version if you are not running Slackware 14.2):
/usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.186 | bash
Please note that "uniprocessor" has to do with the kernel you are running, not with the CPU. Most systems should run the SMP kernel (if they can) regardless of the number of cores the CPU has. If you aren't sure which kernel you are running, run "uname -a". If you see SMP there, you are running the SMP kernel and should use the 4.4.186-smp version when running mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit systems should always use 4.4.186 as the version.
If you are using lilo or elilo to boot the machine, you'll need to ensure that the machine is properly prepared before rebooting.
If using LILO: By default, lilo.conf contains an image= line that references a symlink that always points to the correct kernel. No editing should be required unless your machine uses a custom lilo.conf. If that is the case, be sure that the image= line references the correct kernel file. Either way, you'll need to run "lilo" as root to reinstall the boot loader.
If using elilo: Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish to use, and then run eliloconfig to update the EFI System Partition.
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-alt security, bug fix, and enhancement update Advisory ID: RHSA-2019:2809-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:2809 Issue date: 2019-09-20 CVE Names: CVE-2019-5489 CVE-2019-6974 CVE-2019-13272 ==================================================================== 1. Summary:
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le
- Description:
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
-
Kernel: page cache side channel attacks (CVE-2019-5489)
-
Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974)
-
kernel: broken permission and object lifetime handling for PTRACE_TRACEME (CVE-2019-13272)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
[kernel-alt]: BUG: unable to handle kernel NULL pointer IP: crypto_remove_spawns+0x118/0x2e0 (BZ#1536967)
-
[HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages (BZ#1610534)
-
RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1673613)
-
RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in FIPS mode (BZ#1673979)
-
RHEL-Alt-7.6 - System crashed after oom - During ICP deployment (BZ#1710304)
-
kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127)
-
RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3 cores in quad and misses last core. (CORAL) (BZ#1717836)
-
RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN (BZ#1717906)
-
fragmented packets timing out (BZ#1729066)
-
Backport TCP follow-up for small buffers (BZ#1733617)
Enhancement(s):
-
RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading nest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1664110 - CVE-2019-5489 Kernel: page cache side channel attacks 1671913 - CVE-2019-6974 Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() 1730895 - CVE-2019-13272 kernel: broken permission and object lifetime handling for PTRACE_TRACEME
- Package List:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source: kernel-alt-4.14.0-115.12.1.el7a.src.rpm
aarch64: kernel-4.14.0-115.12.1.el7a.aarch64.rpm kernel-debug-4.14.0-115.12.1.el7a.aarch64.rpm kernel-debug-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm kernel-debug-devel-4.14.0-115.12.1.el7a.aarch64.rpm kernel-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm kernel-debuginfo-common-aarch64-4.14.0-115.12.1.el7a.aarch64.rpm kernel-devel-4.14.0-115.12.1.el7a.aarch64.rpm kernel-headers-4.14.0-115.12.1.el7a.aarch64.rpm kernel-tools-4.14.0-115.12.1.el7a.aarch64.rpm kernel-tools-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm kernel-tools-libs-4.14.0-115.12.1.el7a.aarch64.rpm perf-4.14.0-115.12.1.el7a.aarch64.rpm perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm python-perf-4.14.0-115.12.1.el7a.aarch64.rpm python-perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
noarch: kernel-abi-whitelists-4.14.0-115.12.1.el7a.noarch.rpm kernel-doc-4.14.0-115.12.1.el7a.noarch.rpm
ppc64le: kernel-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-bootwrapper-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-debug-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-debug-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-devel-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-headers-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-tools-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-tools-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-tools-libs-4.14.0-115.12.1.el7a.ppc64le.rpm perf-4.14.0-115.12.1.el7a.ppc64le.rpm perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm python-perf-4.14.0-115.12.1.el7a.ppc64le.rpm python-perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
s390x: kernel-4.14.0-115.12.1.el7a.s390x.rpm kernel-debug-4.14.0-115.12.1.el7a.s390x.rpm kernel-debug-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm kernel-debug-devel-4.14.0-115.12.1.el7a.s390x.rpm kernel-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm kernel-debuginfo-common-s390x-4.14.0-115.12.1.el7a.s390x.rpm kernel-devel-4.14.0-115.12.1.el7a.s390x.rpm kernel-headers-4.14.0-115.12.1.el7a.s390x.rpm kernel-kdump-4.14.0-115.12.1.el7a.s390x.rpm kernel-kdump-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm kernel-kdump-devel-4.14.0-115.12.1.el7a.s390x.rpm perf-4.14.0-115.12.1.el7a.s390x.rpm perf-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm python-perf-4.14.0-115.12.1.el7a.s390x.rpm python-perf-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64: kernel-debug-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm kernel-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm kernel-debuginfo-common-aarch64-4.14.0-115.12.1.el7a.aarch64.rpm kernel-tools-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm kernel-tools-libs-devel-4.14.0-115.12.1.el7a.aarch64.rpm perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm python-perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm
noarch: kernel-doc-4.14.0-115.12.1.el7a.noarch.rpm
ppc64le: kernel-debug-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-debug-devel-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-tools-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm kernel-tools-libs-devel-4.14.0-115.12.1.el7a.ppc64le.rpm perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm python-perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXYS+G9zjgjWX9erEAQgWLQ/9E1IoTs6bpakJ6GIPIMJUeYDCRpXLRrHt CAdDGt7wQ2l5PUY2R98fiCs266c8Vaiqll6PDbFRDwHEI4gSkYnemdC3pdD/u1ct KEch6TBhUejC52t/Zvq2hrUItEj1oz35mVTv+cHHfX9HqVTdV+1SeOR+WoETy+I4 qdBKOSPybxtisp9fdczX0F3uzAfpHqCFVZ2OSvPJmDCZU20gjF+1h+HiyvS4iWT1 qrlMFQ1EliSMbjO/pCTj6PHIcOUNPg7tkx72s5E0qRd4Ja10nZ7QNUh8VGGHNQxb UYLfM7GojPgWx2UzjLo6EU5a9/Xuo6rwgTE5hKWGqZCm645RSv71tpTbdZJe6vnS cyzGIV7NtIvMF625LvimVBB/BSXZK3vYpSuBtcPnvKg2wAet83fIzQ4PtwBpzP7p NfFLvedXg2CRZIYbi5u6tzCqE2UKDpfvKWry8MyELDpt4b4iZEbHt0S4ZdfKzOvu ajvY2VuM414x0FZpWCEHFXT7dbcilf2ZBg0g0UgazRhumm9utfBsbmQz0fS7GcML Ef3YRj97YJPhGoeAQ8b+ox8Z+Q/J+/39smr94scd9FjhotlQgVh9zmd6c4IzisEE iwtg6J38bOHzXi9q3x3Fw4FTe6kUQHeOw9703w/EqojumKVCVCX6VoZ0tmAt720O ItDqWovzGmk=yv43 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-1641", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kernel", "scope": "lt", "trust": 1.8, "vendor": "linux", "version": "5.1.17" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.19.58" }, { "model": "e-series performance analyzer", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "aff a700s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "steelstore cloud integrated storage", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "hci compute node", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "solidfire", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.15" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "29" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.2" }, { "model": "hci management node", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "e-series santricity os controller", "scope": "lte", "trust": 1.0, "vendor": "netapp", "version": "11.60.3" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "3.16.71" }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.9.1" }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.20" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.14.133" }, { "model": "h410c", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.10" }, { "model": "service processor", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "3.16.52" }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.1.39" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.0" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.9.185" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "active iq unified manager", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.4.40" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.4.185" }, { "model": "kernel", "scope": "lt", "trust": 1.0, "vendor": "linux", "version": "4.9" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.04" }, { "model": "h610s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "e-series santricity os controller", "scope": "gte", "trust": 1.0, "vendor": "netapp", "version": "11.0.0" }, { "model": "enterprise linux for real time", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8" }, { "model": "kernel", "scope": "gte", "trust": 1.0, "vendor": "linux", "version": "4.8.16" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "fedora", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006727" }, { "db": "NVD", "id": "CVE-2019-13272" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.133", "versionStartIncluding": "4.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1.17", "versionStartIncluding": "4.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.19.58", "versionStartIncluding": "4.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.16.71", "versionStartIncluding": "3.16.52", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.185", "versionStartIncluding": "4.9.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.2", "versionStartIncluding": "4.1.39", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.185", "versionStartIncluding": "4.4.40", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9", "versionStartIncluding": "4.8.16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.60.3", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-13272" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Google Security Research, Ventsislav Varbanovski,Metasploit,nu11secur1ty,Jann Horn,bcoles", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-809" } ], "trust": 0.6 }, "cve": "CVE-2019-13272", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2019-13272", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-13272", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-13272", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201907-809", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-13272", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-13272" }, { "db": "JVNDB", "id": "JVNDB-2019-006727" }, { "db": "CNNVD", "id": "CNNVD-201907-809" }, { "db": "NVD", "id": "CVE-2019-13272" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments. Linux Kernel Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attacker could use this\nto expose sensitive information. (CVE-2019-10126)\n\nAndrei Vlad Lutas and Dan Lutas discovered that some x86 processors\nincorrectly handle SWAPGS instructions during speculative execution. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nFor the oldstable distribution (stretch), this problem has been fixed\nin version 4.9.168-1+deb9u4. \n\nFor the stable distribution (buster), this problem has been fixed in\nversion 4.19.37-5+deb10u1. This update includes as well a patch for a\nregression introduced by the original fix for CVE-2019-11478 (#930904). \n\nFor the detailed security status of linux please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\ncojPRl2Qd2KSWfEUoze2IqPrr3iAnKFKH6a+WU1XQZuo6r3uo0Q=\n=fTIm\n-----END PGP SIGNATURE-----\n. 8) - x86_64\n\n3. =========================================================================\nUbuntu Security Notice USN-4117-1\nSeptember 02, 2019\n\nlinux-aws vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.04\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux-aws: Linux kernel for Amazon Web Services (AWS) systems\n\nDetails:\n\nIt was discovered that a heap buffer overflow existed in the Marvell\nWireless LAN device driver for the Linux kernel. An attacker could use this\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2019-10126)\n\nAmit Klein and Benny Pinkas discovered that the Linux kernel did not\nsufficiently randomize IP ID values generated for connectionless networking\nprotocols. A remote attacker could use this to track particular Linux\ndevices. (CVE-2019-10638)\n\nIt was discovered that a NULL pointer dereference vulnerability existed in\nthe Near-field communication (NFC) implementation in the Linux kernel. A\nlocal attacker could use this to cause a denial of service (system crash). \n(CVE-2019-12984)\n\nJann Horn discovered a use-after-free vulnerability in the Linux kernel\nwhen accessing LDT entries in some situations. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-13233)\n\nJann Horn discovered that the ptrace implementation in the Linux kernel did\nnot properly record credentials in some situations. A local attacker could\nuse this to cause a denial of service (system crash) or possibly gain\nadministrative privileges. (CVE-2019-13272)\n\nIt was discovered that the floppy driver in the Linux kernel did not\nproperly validate meta data, leading to a buffer overread. A local attacker\ncould use this to cause a denial of service (system crash). \n(CVE-2019-14283)\n\nIt was discovered that the floppy driver in the Linux kernel did not\nproperly validate ioctl() calls, leading to a division-by-zero. A local\nattacker could use this to cause a denial of service (system crash). \n(CVE-2019-14284)\n\nIt was discovered that the Marvell Wireless LAN device driver in the Linux\nkernel did not properly validate the BSS descriptor. A local attacker could\npossibly use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-3846)\n\nJason Wang discovered that an infinite loop vulnerability existed in the\nvirtio net driver in the Linux kernel. A local attacker in a guest VM could\npossibly use this to cause a denial of service in the host system. \n(CVE-2019-3900)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.04:\n linux-image-5.0.0-1014-aws 5.0.0-1014.16\n linux-image-aws 5.0.0.1014.15\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/4117-1\n CVE-2019-10126, CVE-2019-10638, CVE-2019-12984, CVE-2019-13233,\n CVE-2019-13272, CVE-2019-14283, CVE-2019-14284, CVE-2019-3846,\n CVE-2019-3900\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1014.16\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n[slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)\n\nNew kernel packages are available for Slackware 14.2 to fix security issues. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/linux-4.4.182/*: Upgraded. \n These updates fix various bugs and many minor security issues. \n Be sure to upgrade your initrd after upgrading the kernel packages. \n If you use lilo to boot your machine, be sure lilo.conf points to the correct\n kernel and initrd and run lilo as root to update the bootloader. \n If you use elilo to boot your machine, you should run eliloconfig to copy the\n kernel and initrd to the EFI System Partition. \n For more information, see:\n Fixed in 4.4.183:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3892\n Fixed in 4.4.185:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13272\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16597\n Fixed in 4.4.186:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-firmware-20190717_bf13a71-noarch-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-generic-4.4.186-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-generic-smp-4.4.186_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-headers-4.4.186_smp-x86-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-huge-4.4.186-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-huge-smp-4.4.186_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-modules-4.4.186-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-modules-smp-4.4.186_smp-i686-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.186/kernel-source-4.4.186_smp-noarch-1.txz\n\nUpdated packages for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-firmware-20190717_bf13a71-noarch-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-generic-4.4.186-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-headers-4.4.186-x86-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-huge-4.4.186-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-modules-4.4.186-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware66-14.2/patches/packages/linux-4.4.186/kernel-source-4.4.186-noarch-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.2 packages:\n01138ebc336b6e6d692697570bb32920 kernel-firmware-20190717_bf13a71-noarch-1.txz\nd7e0b9ffdc4265b45d4de39d49d52616 kernel-generic-4.4.186-i586-1.txz\nc1131f8dd16f7113cc8b1e14c402a9b7 kernel-generic-smp-4.4.186_smp-i686-1.txz\nca4630c4ee7056c51f3262152bfb9213 kernel-headers-4.4.186_smp-x86-1.txz\n61b95e68756fe9741ddbdc52f397fe49 kernel-huge-4.4.186-i586-1.txz\nff981138513726a502d57f9e2aecad36 kernel-huge-smp-4.4.186_smp-i686-1.txz\nca8f6fb5fc378d16e5afcee31dd032dc kernel-modules-4.4.186-i586-1.txz\n25fc2f1280f1a706705ef4535f4efd1c kernel-modules-smp-4.4.186_smp-i686-1.txz\n2d299723d6f910df1e8c21d18070b9ef kernel-source-4.4.186_smp-noarch-1.txz\n\n\nSlackware x86_64 14.2 packages:\n01138ebc336b6e6d692697570bb32920 kernel-firmware-20190717_bf13a71-noarch-1.txz\n80caffb238022225afe93b957fecbff2 kernel-generic-4.4.186-x86_64-1.txz\nf72e4543e3489d18604f33a901e04551 kernel-headers-4.4.186-x86-1.txz\n0765db332a94cfedcacd987871903e56 kernel-huge-4.4.186-x86_64-1.txz\n8d565a7b223b9444731796e6147116eb kernel-modules-4.4.186-x86_64-1.txz\n0254fdbb4430362ea373b47584d8eb30 kernel-source-4.4.186-noarch-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg kernel-*.txz\n\nIf you are using an initrd, you\u0027ll need to rebuild it. \n\nFor a 32-bit SMP machine, use this command (substitute the appropriate\nkernel version if you are not running Slackware 14.2):\n# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.186-smp | bash\n\nFor a 64-bit machine, or a 32-bit uniprocessor machine, use this command\n(substitute the appropriate kernel version if you are not running\nSlackware 14.2):\n# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.186 | bash\n\nPlease note that \"uniprocessor\" has to do with the kernel you are running,\nnot with the CPU. Most systems should run the SMP kernel (if they can)\nregardless of the number of cores the CPU has. If you aren\u0027t sure which\nkernel you are running, run \"uname -a\". If you see SMP there, you are\nrunning the SMP kernel and should use the 4.4.186-smp version when running\nmkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit\nsystems should always use 4.4.186 as the version. \n\nIf you are using lilo or elilo to boot the machine, you\u0027ll need to ensure\nthat the machine is properly prepared before rebooting. \n\nIf using LILO:\nBy default, lilo.conf contains an image= line that references a symlink\nthat always points to the correct kernel. No editing should be required\nunless your machine uses a custom lilo.conf. If that is the case, be sure\nthat the image= line references the correct kernel file. Either way,\nyou\u0027ll need to run \"lilo\" as root to reinstall the boot loader. \n\nIf using elilo:\nEnsure that the /boot/vmlinuz symlink is pointing to the kernel you wish\nto use, and then run eliloconfig to update the EFI System Partition. \n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel-alt security, bug fix, and enhancement update\nAdvisory ID: RHSA-2019:2809-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:2809\nIssue date: 2019-09-20\nCVE Names: CVE-2019-5489 CVE-2019-6974 CVE-2019-13272\n====================================================================\n1. Summary:\n\nAn update for kernel-alt is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le\n\n3. Description:\n\nThe kernel-alt packages provide the Linux kernel version 4.x. \n\nSecurity Fix(es):\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()\n(CVE-2019-6974)\n\n* kernel: broken permission and object lifetime handling for PTRACE_TRACEME\n(CVE-2019-13272)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* [kernel-alt]: BUG: unable to handle kernel NULL pointer IP:\ncrypto_remove_spawns+0x118/0x2e0 (BZ#1536967)\n\n* [HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages\n(BZ#1610534)\n\n* RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration\n/ powerpc/pseries/mobility: Extend start/stop topology update scope (LPM)\n(BZ#1673613)\n\n* RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in\nFIPS mode (BZ#1673979)\n\n* RHEL-Alt-7.6 - System crashed after oom - During ICP deployment\n(BZ#1710304)\n\n* kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127)\n\n* RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3\ncores in quad and misses last core. (CORAL) (BZ#1717836)\n\n* RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN\n(BZ#1717906)\n\n* fragmented packets timing out (BZ#1729066)\n\n* Backport TCP follow-up for small buffers (BZ#1733617)\n\nEnhancement(s):\n\n* RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading\nnest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1664110 - CVE-2019-5489 Kernel: page cache side channel attacks\n1671913 - CVE-2019-6974 Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()\n1730895 - CVE-2019-13272 kernel: broken permission and object lifetime handling for PTRACE_TRACEME\n\n6. Package List:\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):\n\nSource:\nkernel-alt-4.14.0-115.12.1.el7a.src.rpm\n\naarch64:\nkernel-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-debug-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-debug-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-debug-devel-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-devel-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-headers-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-tools-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-tools-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-tools-libs-4.14.0-115.12.1.el7a.aarch64.rpm\nperf-4.14.0-115.12.1.el7a.aarch64.rpm\nperf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\npython-perf-4.14.0-115.12.1.el7a.aarch64.rpm\npython-perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\n\nnoarch:\nkernel-abi-whitelists-4.14.0-115.12.1.el7a.noarch.rpm\nkernel-doc-4.14.0-115.12.1.el7a.noarch.rpm\n\nppc64le:\nkernel-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-bootwrapper-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-debug-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-debug-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-devel-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-headers-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-tools-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-tools-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-tools-libs-4.14.0-115.12.1.el7a.ppc64le.rpm\nperf-4.14.0-115.12.1.el7a.ppc64le.rpm\nperf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\npython-perf-4.14.0-115.12.1.el7a.ppc64le.rpm\npython-perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\n\ns390x:\nkernel-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-debug-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-debug-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-debug-devel-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-debuginfo-common-s390x-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-devel-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-headers-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-kdump-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-kdump-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm\nkernel-kdump-devel-4.14.0-115.12.1.el7a.s390x.rpm\nperf-4.14.0-115.12.1.el7a.s390x.rpm\nperf-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm\npython-perf-4.14.0-115.12.1.el7a.s390x.rpm\npython-perf-debuginfo-4.14.0-115.12.1.el7a.s390x.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):\n\naarch64:\nkernel-debug-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-tools-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\nkernel-tools-libs-devel-4.14.0-115.12.1.el7a.aarch64.rpm\nperf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\npython-perf-debuginfo-4.14.0-115.12.1.el7a.aarch64.rpm\n\nnoarch:\nkernel-doc-4.14.0-115.12.1.el7a.noarch.rpm\n\nppc64le:\nkernel-debug-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-debug-devel-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-tools-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\nkernel-tools-libs-devel-4.14.0-115.12.1.el7a.ppc64le.rpm\nperf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\npython-perf-debuginfo-4.14.0-115.12.1.el7a.ppc64le.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBXYS+G9zjgjWX9erEAQgWLQ/9E1IoTs6bpakJ6GIPIMJUeYDCRpXLRrHt\nCAdDGt7wQ2l5PUY2R98fiCs266c8Vaiqll6PDbFRDwHEI4gSkYnemdC3pdD/u1ct\nKEch6TBhUejC52t/Zvq2hrUItEj1oz35mVTv+cHHfX9HqVTdV+1SeOR+WoETy+I4\nqdBKOSPybxtisp9fdczX0F3uzAfpHqCFVZ2OSvPJmDCZU20gjF+1h+HiyvS4iWT1\nqrlMFQ1EliSMbjO/pCTj6PHIcOUNPg7tkx72s5E0qRd4Ja10nZ7QNUh8VGGHNQxb\nUYLfM7GojPgWx2UzjLo6EU5a9/Xuo6rwgTE5hKWGqZCm645RSv71tpTbdZJe6vnS\ncyzGIV7NtIvMF625LvimVBB/BSXZK3vYpSuBtcPnvKg2wAet83fIzQ4PtwBpzP7p\nNfFLvedXg2CRZIYbi5u6tzCqE2UKDpfvKWry8MyELDpt4b4iZEbHt0S4ZdfKzOvu\najvY2VuM414x0FZpWCEHFXT7dbcilf2ZBg0g0UgazRhumm9utfBsbmQz0fS7GcML\nEf3YRj97YJPhGoeAQ8b+ox8Z+Q/J+/39smr94scd9FjhotlQgVh9zmd6c4IzisEE\niwtg6J38bOHzXi9q3x3Fw4FTe6kUQHeOw9703w/EqojumKVCVCX6VoZ0tmAt720O\nItDqWovzGmk=yv43\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2019-13272" }, { "db": "JVNDB", "id": "JVNDB-2019-006727" }, { "db": "VULMON", "id": "CVE-2019-13272" }, { "db": "PACKETSTORM", "id": "154044" }, { "db": "PACKETSTORM", "id": "153972" }, { "db": "PACKETSTORM", "id": "154045" }, { "db": "PACKETSTORM", "id": "153699" }, { "db": "PACKETSTORM", "id": "153970" }, { "db": "PACKETSTORM", "id": "154316" }, { "db": "PACKETSTORM", "id": "153702" }, { "db": "PACKETSTORM", "id": "154553" } ], "trust": 2.43 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=47133", "trust": 0.3, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-13272" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-13272", "trust": 3.3 }, { "db": "PACKETSTORM", "id": "153702", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "153663", "trust": 1.6 }, { "db": "PACKETSTORM", "id": "156929", "trust": 1.6 }, { "db": "PACKETSTORM", "id": "154957", "trust": 1.6 }, { "db": "PACKETSTORM", "id": "165051", "trust": 1.6 }, { "db": "PACKETSTORM", "id": "154245", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2019-006727", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4646", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2704", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4346", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4252", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2749", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4346.2", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "50541", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "47163", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "47133", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-29592", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201907-809", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-13272", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154044", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "153972", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154045", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "153699", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "153970", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154316", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154553", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-13272" }, { "db": "JVNDB", "id": "JVNDB-2019-006727" }, { "db": "PACKETSTORM", "id": "154044" }, { "db": "PACKETSTORM", "id": "153972" }, { "db": "PACKETSTORM", "id": "154045" }, { "db": "PACKETSTORM", "id": "153699" }, { "db": "PACKETSTORM", "id": "153970" }, { "db": "PACKETSTORM", "id": "154316" }, { "db": "PACKETSTORM", "id": "153702" }, { "db": "PACKETSTORM", "id": "154553" }, { "db": "CNNVD", "id": "CNNVD-201907-809" }, { "db": "NVD", "id": "CVE-2019-13272" } ] }, "id": "VAR-201907-1641", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25113124 }, "last_update_date": "2024-07-23T21:13:51.034000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ChangeLog-5.1.17", "trust": 0.8, "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.1.17" }, { "title": "[SECURITY] [DLA 1862-1] linux security update", "trust": 0.8, "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html" }, { "title": "[SECURITY] [DLA 1863-1] linux-4.9 security update", "trust": 0.8, "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html" }, { "title": "DSA-4484", "trust": 0.8, "url": "https://www.debian.org/security/2019/dsa-4484" }, { "title": "FEDORA-2019-a95015e60f", "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ogrk5lywbj4e4sri4dkx367nhysi3voh/" }, { "title": "ptrace: Fix -\u003eptracer_cred handling for PTRACE_TRACEME", "trust": 0.8, "url": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "title": "Linux Kernel Archives", "trust": 0.8, "url": "http://www.kernel.org" }, { "title": "ptrace: Fix -\u003eptracer_cred handling for PTRACE_TRACEME", "trust": 0.8, "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20192411 - security advisory" }, { "title": "Red Hat: Important: kernel-rt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20192405 - security advisory" }, { "title": "Debian Security Advisories: DSA-4484-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=f7aec913c227117e479ebfa6af2b1b9a" }, { "title": "Red Hat: CVE-2019-13272", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2019-13272" }, { "title": "Ubuntu Security Notice: linux, linux-hwe, linux-azure, linux-gcp, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-4093-1" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-4095-1" }, { "title": "Ubuntu Security Notice: linux-aws vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-4117-1" }, { "title": "IBM: IBM Security Bulletin: Linux Kernel vulnerabilities affect IBM Spectrum Protect Plus CVE-2019-10140, CVE-2019-11477, CVE-2019-11478, CVE-2019-11479, CVE-2019-13233, CVE-2019-13272, CVE-2019-14283, CVE-2019-14284, CVE-2019-15090, CVE-2019-15807, CVE-2019-15925", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=d9cd8f6d11c68af77f2f2bd27ca37bed" }, { "title": "Ubuntu Security Notice: linux, linux-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-4094-1" }, { "title": "IBM: Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (March 2021)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=afc44ca312a83d419e062241c4789aae" }, { "title": "Ubuntu Security Notice: linux-aws vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-4118-1" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=ec6577109e640dac19a6ddb978afe82d" }, { "title": "CVE-2019-13272 - Pkexec Local Privilege Escalation", "trust": 0.1, "url": "https://github.com/asepsaepdin/cve-2019-13272 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-13272" }, { "db": "JVNDB", "id": "JVNDB-2019-006727" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006727" }, { "db": "NVD", "id": "CVE-2019-13272" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1903" }, { "trust": 2.4, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730895" }, { "trust": 2.4, "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140671" }, { "trust": 2.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13272" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/165051/linux-kernel-5.1.x-ptrace_traceme-pkexec-local-privilege-escalation.html" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/153663/linux-ptrace_traceme-broken-permission-object-lifetime-handling.html" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/156929/linux-ptrace_traceme-local-root.html" }, { "trust": 2.2, "url": "https://www.debian.org/security/2019/dsa-4484" }, { "trust": 2.2, "url": "http://packetstormsecurity.com/files/153702/slackware-security-advisory-slackware-14.2-kernel-updates.html" }, { "trust": 2.2, "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2411" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2405" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2809" }, { "trust": 1.6, "url": "http://packetstormsecurity.com/files/154957/linux-polkit-pkexec-helper-ptrace_traceme-local-root.html" }, { "trust": 1.6, "url": "https://security.netapp.com/advisory/ntap-20190806-0001/" }, { "trust": 1.6, "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.1.17" }, { "trust": 1.6, "url": "https://support.f5.com/csp/article/k91025336" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html" }, { "trust": 1.6, "url": "https://seclists.org/bugtraq/2019/jul/30" }, { "trust": 1.6, "url": "https://usn.ubuntu.com/4094-1/" }, { "trust": 1.6, "url": "https://seclists.org/bugtraq/2019/jul/33" }, { "trust": 1.6, "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "trust": 1.6, "url": "https://usn.ubuntu.com/4117-1/" }, { "trust": 1.6, "url": "https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee" }, { "trust": 1.6, "url": "https://usn.ubuntu.com/4093-1/" }, { "trust": 1.6, "url": "https://usn.ubuntu.com/4095-1/" }, { "trust": 1.6, "url": "http://packetstormsecurity.com/files/154245/kernel-live-patch-security-notice-lsn-0054-1.html" }, { "trust": 1.6, "url": "https://usn.ubuntu.com/4118-1/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ogrk5lywbj4e4sri4dkx367nhysi3voh/" }, { "trust": 1.0, "url": "https://support.f5.com/csp/article/k91025336?utm_source=f5support\u0026amp%3butm_medium=rss" }, { "trust": 0.9, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13272" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ogrk5lywbj4e4sri4dkx367nhysi3voh/" }, { "trust": 0.6, "url": "https://support.f5.com/csp/article/k91025336?utm_source=f5support\u0026utm_medium=rss" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193255-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193252-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193249-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193248-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193247-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193258-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193260-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193261-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193263-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193246-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2704/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2749/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4646/" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-29592" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4346/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4252/" }, { "trust": 0.6, "url": "https://www.exploit-db.com/exploits/50541" }, { "trust": 0.6, "url": "https://www.exploit-db.com/exploits/47133" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/linux-kernel-privilege-escalation-via-ptrace-link-29820" }, { "trust": 0.6, "url": "https://www.exploit-db.com/exploits/47163" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/153663/linux-ptrace/traceme-broken-permission-object-lifetime-handling.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4346.2/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1125" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10126" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3846" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2019-13272" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11599" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12614" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-1125" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/4329821" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13233" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12984" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1054.61" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4095-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-159.187" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1122.128" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1090.101" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1118.127" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5383" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4093-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1013.14" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1013.13" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-25.26~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/5.0.0-1018.19" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1014.14" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1014.14~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.0.0-25.26" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1014.14" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/linux" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10638" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4117-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3900" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14283" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1014.16" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16597" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3892" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10126" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16597" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3892" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11599" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3846" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5489" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6974" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-6974" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-5489" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006727" }, { "db": "PACKETSTORM", "id": "154044" }, { "db": "PACKETSTORM", "id": "153972" }, { "db": "PACKETSTORM", "id": "154045" }, { "db": "PACKETSTORM", "id": "153699" }, { "db": "PACKETSTORM", "id": "153970" }, { "db": "PACKETSTORM", "id": "154316" }, { "db": "PACKETSTORM", "id": "153702" }, { "db": "PACKETSTORM", "id": "154553" }, { "db": "CNNVD", "id": "CNNVD-201907-809" }, { "db": "NVD", "id": "CVE-2019-13272" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2019-13272" }, { "db": "JVNDB", "id": "JVNDB-2019-006727" }, { "db": "PACKETSTORM", "id": "154044" }, { "db": "PACKETSTORM", "id": "153972" }, { "db": "PACKETSTORM", "id": "154045" }, { "db": "PACKETSTORM", "id": "153699" }, { "db": "PACKETSTORM", "id": "153970" }, { "db": "PACKETSTORM", "id": "154316" }, { "db": "PACKETSTORM", "id": "153702" }, { "db": "PACKETSTORM", "id": "154553" }, { "db": "CNNVD", "id": "CNNVD-201907-809" }, { "db": "NVD", "id": "CVE-2019-13272" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-17T00:00:00", "db": "VULMON", "id": "CVE-2019-13272" }, { "date": "2019-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006727" }, { "date": "2019-08-13T17:45:06", "db": "PACKETSTORM", "id": "154044" }, { "date": "2019-08-07T20:11:10", "db": "PACKETSTORM", "id": "153972" }, { "date": "2019-08-13T17:45:15", "db": "PACKETSTORM", "id": "154045" }, { "date": "2019-07-20T19:11:11", "db": "PACKETSTORM", "id": "153699" }, { "date": "2019-08-07T20:10:41", "db": "PACKETSTORM", "id": "153970" }, { "date": "2019-09-02T23:48:33", "db": "PACKETSTORM", "id": "154316" }, { "date": "2019-07-22T09:32:22", "db": "PACKETSTORM", "id": "153702" }, { "date": "2019-09-20T15:08:09", "db": "PACKETSTORM", "id": "154553" }, { "date": "2019-07-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-809" }, { "date": "2019-07-17T13:15:10.687000", "db": "NVD", "id": "CVE-2019-13272" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2019-13272" }, { "date": "2019-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006727" }, { "date": "2021-11-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-809" }, { "date": "2023-11-07T03:03:48.947000", "db": "NVD", "id": "CVE-2019-13272" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "154045" }, { "db": "PACKETSTORM", "id": "153699" }, { "db": "CNNVD", "id": "CNNVD-201907-809" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux Kernel Vulnerabilities related to authorization, permissions, and access control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006727" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-809" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.